Announcing Network Analytics

Our Analytics Platform

Announcing Network Analytics

Back in March 2019, we released Firewall Analytics which provides insights into HTTP security events across all of Cloudflare's protection suite; Firewall rule matches, HTTP DDoS Attacks, Site Security Level which harnesses Cloudflare's threat intelligence, and more. It helps customers tailor their security configurations more effectively. The initial release was for Enterprise customers, however we believe that everyone should have access to powerful tools, not just large enterprises, and so in December 2019 we extended those same enterprise-level analytics to our Business and Pro customers.

Announcing Network Analytics
Source: https://imgflip.com/memegenerator

Since then, we’ve built on top of our analytics platform; improved the usability, added more functionality and extended it to additional Cloudflare services in the form of Account Analytics, DNS Analytics, Load Balancing Analytics, Monitoring Analytics and more.

Our entire analytics platform harnesses the powerful GraphQL framework which is also available to customers that want to build, export and share their own custom reports and dashboards.

Extending Visibility From L7 To L3

Until recently, all of our dashboards were mostly HTTP-oriented and provided visibility into HTTP attributes such as the user agent, hosts, cached resources, etc. This is valuable to customers that use Cloudflare to protect and accelerate HTTP Continue reading

vlog. Episode 8. History and future of the networking.

Hello my friend,

Today I have a unique opportunity to talk to one of the most well-known authors in the networking industry. Especially if you ever studied for CCIE (link). This is a legendary person, which put his hands on the implementation of many technologies in the service providers, data centres and enterprises.

In this episode, together with Jeff Doyle (yes, this particular Jeff Doyle) we discuss his experience as an author of the networking books, and as a network engineer and architect. We discuss the major steps in the telecommunication’s development over a couple of past decades and what we should expect.

On top of that, Jeff shares his opinion on the skills necessary for the network engineers now and in the future.

Don’t forget to subscribe for the channel, put likes and repost the video if you like that! ?

Support us





P.S.

If you have further questions or you need help with Continue reading

Understanding, detecting and localizing partial failures in large system software

Understanding, detecting and localizing partial failures in large system software, Lou et al., NSDI’20

Partial failures (gray failures) occur when some but not all of the functionalities of a system are broken. On the surface everything can appear to be fine, but under the covers things may be going astray.

When a partial failure occurs, it often takes a long time to detect the incident. In contrast, a process suffering a total failure can be quickly identified, restarted, or repaired by existing mechanisms, thus limiting the failure impact.

Because everything can look fine on the surface, traditional failure detectors or watchdogs using external probes or monitoring statistics may not be able to pick up on the problem. Today’s paper choice won the authors a best paper award at NSDI’20. It contains a study of partial failure causes, and a novel approach to fault detection using system-specific, auto-generated watchdogs.

Characterising partial failures

Before designing a better system for detecting partial failures, the authors set about understanding their nature and causes through a study of five software systems (ZooKeeper, Cassandra, HDFS, Apache, and Mesos). For each of these systems they crawled the bug databases to find critical issues Continue reading

As networks evolve enterprises need to rethink security

Digital innovation is disrupting businesses. Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To make this possible, organizations are radically redesigning their networks by adopting multi-cloud environments, building hyperscale data centers, retooling their campuses, and designing new connectivity systems for their next-gen branch offices. Networks are faster than ever before, more agile and software-driven. They're also increasingly difficult to secure. To understand the challenges and how security needs to change, I recently talked with John Maddison, executive vice president of products for network security vendor Fortinet.To read this article in full, please click here

As the networks evolve enterprises need to rethink network security

Digital innovation is disrupting businesses. Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To make this possible, organizations are radically redesigning their networks by adopting multi-cloud environments, building hyperscale data centers, retooling their campuses, and designing new connectivity systems for their next-gen branch offices. Networks are faster than ever before, more agile and software-driven. They're also increasingly difficult to secure. To understand the challenges and how security needs to change, I recently talked with John Maddison, executive vice president of products for network security vendor Fortinet.To read this article in full, please click here

CEX (Code EXpress) 07. Loops are bad in the networks, but not in code.

Hello my friend,

We have covered all the necessary types of the Python’s variables (ordinary, lists and dictionaries) and now we can move on with further concepts. And the first immediate pit stop is the question “how can we work with the Python’s lists and dictionaries efficiently?” The answer wold be “just loop them”!

Network automation training – boost your career

Don’t wait to be kicked out of IT business. Join our network automation training to secure your job in future. Come to NetDevOps side.

How does the training differ from this blog post series? Here you get the basics and learn some programming concepts in general, whereas in the training you get comprehensive set of knowledge with the detailed examples how to use Python for the network and IT automation. You need both.

What are we going to do today?

The looping of the sibling’s element out of any data structure, such as a Python’s list or a dictionary, is one of the essential building blocks of any programming code, including the simplest ones. Therefore, today you will learn:

  • How to create loop over Python’s lists using for instruction.
  • How to create loop over Continue reading

FortiGuard Labs’ Derek Manky Talks Swarm Attacks, War of Deception

Collaboration and deception are two tools that Manky says should play a prominent role in...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Broadcom Pulls 2020 Guidance as Coronavirus Fuels Uncertainty

As the coronavirus continues to wreak havoc on financial markets, Broadcom has so far avoided sales...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

vlog. Episode 7. Open Networking and white boxes

Hello my friend,

after short pause caused by the launch of the Network Automation Training we continue our video blog series. We’ve written a lot about open networking so far and today we talk about it.

CY2019 Episode 7 // Open Networking with Avi Alkobi

In this episode, together with Avi Alkobi from Mellanox we explore the Open Networking world from the Data Centres perspective. On a side note, we discuss the new paradigm for networking: open-source vs. traditional vendor lock-in.

Don’t forget to subscribe for the channel, put likes and repost the video if you like that! ?

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,
Anton Karneliuk

Daily Roundup: Operators Respond to Coronavirus

Operators responded to expected network impacts from the Coronavirus; Oracle Cloud surged in Q3;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

T-Mobile’s Post-Merger Executive Team Takes Shape

The executive team at the new company is primarily comprised of existing T-Mobile US leaders. Of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Juniper Drives Kubernetes Into the Networking Conversation

The vendor has a twofold strategy to address multiple orchestration and enterprise challenges in...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Heavy Networking 506: Where Is The Industry Headed With Intent-Based Networking?

Where is the networking industry with Intent-Based Networking (IBN)? On today's Heavy Networking we talk about efforts to come to some agreement on just what constitutes IBN, dive into graph databases, and examine proposed IETF definitions of the technology. Our guests are Jeff Tantsura, head of networking strategy at Apstra and IETF chair; and Phil Gervasi, a solutions architect.

Heavy Networking 506: Where Is The Industry Headed With Intent-Based Networking?

Where is the networking industry with Intent-Based Networking (IBN)? On today's Heavy Networking we talk about efforts to come to some agreement on just what constitutes IBN, dive into graph databases, and examine proposed IETF definitions of the technology. Our guests are Jeff Tantsura, head of networking strategy at Apstra and IETF chair; and Phil Gervasi, a solutions architect.

The post Heavy Networking 506: Where Is The Industry Headed With Intent-Based Networking? appeared first on Packet Pushers.

SD-WAN Vendors Target SMBs as Competition Ramps Up

With at least 70 SD-WAN vendors on the market, standing out from the pack can be tricky. In an...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Configuring Kustomize Transformers for Cluster API

In November 2019 I wrote an article on using kustomize with Cluster API (CAPI) manifests. The idea was to use kustomize to simplify the management of CAPI manifests for clusters that are generally similar but have minor differences (like the AWS region in which they are running, or the number of Machines in a MachineDeployment). In this post, I’d like to show a slightly different way of using kustomize with Cluster API that involves configuring the kustomize transformers.

If you aren’t familiar with kustomize, I’d recommend having a look at the kustomize web site and/or reading my introductory post. A transformer in kustomize is the part that is responsible for modifying a resource, or gathering information about a resource over the course of a kustomize build process. This page has some useful terminology definitions.

Looking back at the earlier article on using kustomize with CAPI, you can see that—due to the links/references between objects—modifying the name of the AWSCluster object also means modifying the reference to the AWSCluster object from the Cluster object. The same goes for the KubeadmConfigTemplate and AWSMachineTemplate objects referenced from a MachineDeployment. Out of the box, the namePrefix transformer will change the names of these Continue reading